JUNIPER NETWORKS vSRX Virtual Firewall Instruction Manual

June 5, 2024
JUNIPER NETWORKS

JUNIPER NETWORKS vSRX Virtual Firewall

JUNIPER-NETWORKS-vSRX-Virtual-Firewall-PRODUCT

Installing the JSA 7.3.3 Fix Pack 11 (Patch 11) Interim Fix 01 Software

Update

JSA 7.3.3 Fix Pack 11 (Patch 11) Interim Fix 01 resolves reported issues from users and administrators from previous JSA versions. This cumulative software update fixes known software issues in your JSA deployment. JSA software updates are installed by using an SFS file. The software update can update all appliances attached to the JSA Console.
Use the 7.3.3.20220318161607-IF01-20220517151911 SFS file to upgrade JSA 7.3.3 Fix Pack 11 (Patch 11) to JSA 7.3.3 Fix Pack 11 (Patch 11) Interim Fix 01.
This document does not cover all the installation messages and requirements, such as changes to appliance memory requirements or browser requirements for JSA. For more information, see the Juniper Secure Analytics Upgrading JSA to 7.3.3.

Ensure that you take the following precautions:

  • Back up your data before you begin any software upgrade. For more information about backup and recovery, see the Juniper Secure Analytics Administration Guide.
  • To avoid access errors in your log file, close all open JSA webUI sessions.
  • The software update for JSA cannot be installed on a managed host that is at a different software version from the Console. All appliances in the deployment must be at the same software revision to update the entire deployment.
  • Verify that all changes are deployed on your appliances. The update cannot install on appliances that have changes that are not deployed.
  • If this is a new installation, administrators must review the instructions in the Juniper Secure Analytics Installation Guide.

To install the JSA 7.3.3 Fix Pack 11 (Patch 11) Interim Fix 01 software update:

  1. Download the 7.3.3.20220318161607-IF01-20220517151911 SFS from the Juniper Customer Support website.
    https://support.juniper.net/support/downloads/

  2. Using SSH, log into your system as the root user.

  3. To verify you have enough space (5 GB) in /store/tmp for the JSA Console, type the following command: df -h /tmp /storetmp /store/transient | tee diskchecks.txt

    • Best directory option: /storetmp It is available on all appliance types at all versions. In JSA 7.3.0 versions /store/tmp is a symlink to the /storetmp partition.
    • 2nd best directory option: /tmp This directory is available on all appliances, but in 7.3.0 the version is significantly smaller and moving a file here can cause services to stop. If you leave a file in /tmp for 10 days without completing the SFS update, it might get cleaned up by Red Hat’s tmpwatch cron job.
    • 3rd best option: /store/transient The store/transient directory was introduced in JSA 2014.1 and is allocated 10% of the overall /store directory. However, this directory does not exist on all appliances and might not be an actual partition on all appliances. If the disk check command fails, retype the quotation marks from your terminal, then re-run the command. This command returns the details to both the command window and to a file on the Console named diskchecks.txt. Review this file to ensure that all appliances have at minimum 5 GB of space available in a directory to copy the SFS before attempting to move the file to a managed host. If required, free up disk space on any host that fails to have less than 5 GB available.
      NOTE: In JSA 7.3.0 and later, an update to directory structure for STIG compliant directories reduces the size of several partitions. This can impact moving large files to JSA.
  4. To create the /media/updates directory, type the following command:
    mkdir -p /media/updates

  5. Using SCP, copy the files to the JSA Console to the /storetmp directory or a location with 5 GB of disk space.
    NOTE: If the SFS file is in the /storetmp directory and you do not upgrade, when the overnight diskmaintd.pl utility runs, the SFS file is deleted.

  6. Change to the directory where you copied the patch file. For example, cd /storetmp

  7. Unzip the file in the /storetmp directory using the bunzip utility: bunzip2 7.3.3.20220318161607-IF01-20220517151911.sfs.bz2

  8. To mount the patch file to the /media/updates directory, type the following command: mount -o loop -t squashfs /storetmp/7.3.3.20220318161607-IF01-20220517151911.sfs /media/updates

  9. To run the patch installer, type the following command: /media/updates/installer
    NOTE: The first time that you run the software update, there might be a delay before the software update installation menu is displayed.

  10. Using the patch installer, select all.

    • The all option updates the software on all appliances in the following order:
    • Console
    • Remaining appliances.
    • If you do not select the all option, you must select your Console appliance.
      As of the JSA 2014.6.r4 patch and later, administrators are only provided the option to update all or update the Console appliance. Managed hosts are not displayed in the installation menu to ensure that the console is patched first. After the console is patched, a list of managed hosts that can be updated is displayed in the installation menu. This change was made starting with the JSA 2014.6.r4 patch to ensure that the console appliance is always updated before managed hosts to prevent upgrade issues.
      If administrators want to patch systems in series, they can update the console first, then copy the patch to all other appliances and run the software update installer individually on each managed host. The console must be patched before you can run the installer on managed hosts. When updating in parallel, there is no order required in how you update appliances after the console is updated. If your Secure Shell (SSH) session is disconnected while the upgrade is in progress, the upgrade continues. When you reopen your SSH session and rerun the installer, the patch installation resumes.

Installation Wrap-up

  1. After the patch completes and you have exited the installer, type the following command: umount /media/updates
  2. Clear your browser cache before logging in to the Console.
  3. Delete the SFS file from all appliances.

A summary of the software update installation advises you of any managed host that were not updated. If the software update fails to update a managed host, you can copy the software update to the host and run the installation locally.
After all hosts are updated, administrators can send an email to their team to inform them that they will need to clear their browser cache before logging in to the JSA.

Clearing the Cache

After you install the patch, you must clear your Java cache and your web browser cache before you log into the JSA appliance.
Before you begin
Ensure that you have only one instance of your browser open. If you have multiple versions of your browser open, the cache might fail to clear. Ensure that the Java Runtime Environment is installed on the desktop system that you use to view the user interface. You can download Java version 1.7 from the Java website: http://java.com/.

About this task
If you use the Microsoft Windows 7 operating system, the Java icon is typically located under the Programs pane.

To clear the cache:

  1. Clear your Java cache:
    • On your desktop, select Start > Control Panel.
    • Double-click the Java icon.
    • In the Temporary Internet Files pane, click View.
    • On the Java Cache Viewer window, select all Deployment Editor entries.
    • Click the Delete icon.
    • Click Close.
    • Click OK.
  2. Open your web browser.
  3. Clear the cache of your web browser. If you use the Mozilla Firefox web browser, you must clear the cache in the Microsoft Internet Explorer and Mozilla Firefox web browsers.
  4. 4. Log in to JSA.

Known Issues and Limitations

None

Resolved Issues

The resolved issues addressed in the JSA 7.3.3 Fix Pack 11 (Patch 11) Interim Fix 01 are listed below:

  • Updated Spring to 5.3.18 to mitigate CVE-2022-22963 and CVE-2022-22965.
  • Updated Spring to 5.3.18 to mitigate CVE-2022-22963 and CVE-2022-22965 in Forensics.

Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Copyright © 2022 Juniper Networks, Inc. All rights reserved.

References

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

JUNIPER NETWORKS User Manuals

Related Manuals